Militantly FREE software support.

Search form

Main menu

May 2012

This tutorial shows how you can set up a Linux Mint 13 (Maya) desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

This document describes how to install a PureFTPd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota and upload/download bandwidth limits with this setup. Passwords will be stored encrypted as MD5 strings in the database.

Forums:

I have a bit of a problem, I'm trying to write a program in C for a RP6 robot (www.arexx.com) and i'm trying to include the "pthread.h" file. but to compile i need to link the library, so i made sure that in my makefile there was a "-lpthread" but the compiler now sais:

This tutorial shows how you can set up an Ubuntu Studio 12.04 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. Please note that Ubuntu Studio 12.04 uses Xfce as the default desktop environment.

This document describes how to add WiKID two-factor authentication to Apache 2.2.22 using mod_auth_radius on Ubuntu 12.04. It is also recommended that you consider using mutual https authentication for web applications that are worthy of two-factor authentication. Strong mutual authentication means that the targeted website is authenticated to the user in some cryptographically secure manner, thwarting most man-in-the-middle attacks. The use of cryptography is key. While some sites use an image in an attempt to validate a server, it should be noted that any man-in-the-middle could simply replay such an image.

Backups are usually made in one of two ways - either file-based which means that single files are backed up, often via synchronization and on an external disk, or image-based which means that a whole partition is stuffed into an image file that can be restored on the partition, containing everything there was on it. This tutorial covers image-based backups using Partimage from a live desktop environment.